Filters








362,192 Hits in 10.0 sec

A Novel Approach to Digital Contents Sharing for Digital Home Network

Danmei Niu, Zhiyong Zhang, Shaofeng Wang, Lili Zhang
2011 International Journal of Digital Content Technology and its Applications  
This approach adopts the idea of Role-Based Access Control (RBAC) and license chain and allows digital contents sharing to be convenient and controlled.  ...  Different family members need different access rights to DRM contents in their home networks. This paper presents a novel approach to digital contents sharing for digital home network.  ...  Acknowledgment We would like to express our gratitude to the anonymous reviewers of this paper for their helpful comments and suggestions.  ... 
doi:10.4156/jdcta.vol5.issue11.41 fatcat:xmfhcazxgbfprmeswpcyl52l6u

Security and Digital Libraries [chapter]

Edward Fox, Noha ElSherbiny
2011 Digital Libraries - Methods and Applications  
Content based access control Another approach to access control models involves defining models according to content.  ...  Role-based access control Role-based access control involves policies that regulate information access based on the activities the users perform.  ...  This book is an attempt to share the practical experiences of solutions to the operation of digital libraries.  ... 
doi:10.5772/15762 fatcat:wzanvrj3mnc2hpdnkocxg3ipeq

Ontology-Based Access Rights Management [chapter]

Michel Buffa, Catherine Faron-Zucker
2012 Studies in Computational Intelligence  
In this paper we propose an approach to manage access rights in a content management systems which relies on semantic web models and technologies.  ...  We present the AMO ontology which consists (1) in a set of classes and properties dedicated to the annotation of resources whose access should be controlled and (2) in a base of inference rules modeling  ...  In this paper we consider content management systems based on semantic web servers and we propose an approach for managing access rights to resources based on semantic web models and techniques.  ... 
doi:10.1007/978-3-642-25838-1_3 fatcat:preyon2iine5fa2gkevb6tjzom

A secure solution for commercial digital libraries

Mariemma I. Yagüe, Antonio Maña, Javier López, Ernesto Pimentel, José M. Troya
2003 Online information review (Print)  
Access control in distributed systems often relies on centralized security administration. Existing solutions for distributed access control do not provide the flexibility and manageability required.  ...  This paper presents the XML-based Secure Content Distribution (XSCD) infrastructure, which is based on the production of protected software objects that convey contents (software or data) and can be distributed  ...  Existing XML-based languages for access control, authorization and digital rights management are not based on a modular approach and do not provide some important features such as policy composition and  ... 
doi:10.1108/14684520310481418 fatcat:34ahblby5reehhd3tbixn4wzrq

Prioritizing use over perfection: a risk management approach to digital preservation

Rachel Trent, Matthew Mihalik
2019 Zenodo  
Traditionally, many institutions follow standards-based approaches to digital preservation, which emphasize meeting certain benchmarks or thresholds, and enhancement-based models for user experience and  ...  In this talk, we will present a frank "under the hood" look at GW's digital preservation strategies and services (including our Simple Audit Tool & the role of Hyrax as an access environment) and the risk  ...  copies of selective digital assets • Clearly articulated policy of commitments to our digital content • Clear roles and responsibilities between GW units for management of digital assets Current risk  ... 
doi:10.5281/zenodo.3554108 fatcat:nkhbnawvhbapxdc7wfttmsfsce

A DRM System for Home Network Based on RBAC and License Chain

Danmei Niu, Zhiyong Zhang, Lili Zhang
2010 2010 Fourth International Conference on Genetic and Evolutionary Computing  
The paper presented a DRM system for home network based on RBAC (Role-Based Access Control) and license chain.  ...  The purpose of DRM (Digital Rights Management) is to prevent from the illegal copy and distribution of digital contents.  ...  In this paper, we present a DRM system for home network based on RBAC (Role-Based Access Control) and license chain that controls the access rights of family members and devices. II.  ... 
doi:10.1109/icgec.2010.224 fatcat:mcybrtydizbu7euqkcu4grh4ya

Structuring the Social Subsystem Components of the Community Based E-Museum Framework [chapter]

Suriyati Razali, Nor Laila Md. Noor, Wan Adilah Wan Adnan
2009 Lecture Notes in Computer Science  
We developed a conceptual framework of a community based emuseum (ComE) to facilitate the design of community knowledge sharing in as an attempt to solve the economic issues of sustaining a cultural heritage  ...  This movement has now motivated the museum community to provide a systematic establishment to support the digital cultural heritage preservation through e-museum.  ...  Besides an organized and structured data, the quality of digital contents is considered for better control over the trusted digital repository.  ... 
doi:10.1007/978-3-642-02774-1_12 fatcat:amxlby2jkbhqpmjb4mbev524we

Usage Control Model for Digital Rights Management in Digital Home Networks

Zhiyong Zhang, Tao Huang, Danmei Niu, Lili Zhang
2011 Journal of Multimedia  
The paper proposes a role-based cross-domain usage control model called the RCDUCM for DHN, which embraces two primary features of both role-based access control and security domain constraint management  ...  An application case denotes that the proposed model can implement consumer-contents-device license binding and transferring, the result of which is copyright protection of purchased digital contents against  ...  ACKNOWLEDGMENT We would like to express our gratitude to the anonymous reviewers of this paper for their helpful comments and suggestions.  ... 
doi:10.4304/jmm.6.4.376-383 fatcat:22463aypzvasba6mko2guvxgqq

Secure Content Distribution for Digital Libraries [chapter]

Mariemma I. Yagüe, Antonio Maña, Javier López, Ernesto Pimentel, José M. Troya
2002 Lecture Notes in Computer Science  
The system is based on the combination of the use of an external authorization infrastructure, a software protection mechanism and a modular language to specify how access to the contents is controlled  ...  Traditional access control schemes such as mandatory access control (MAC), discretionary access control (DAC) or even role based access control (RBAC) are not appropriate for complex distributed systems  ...  These ones play an essential role in the flexibility of management of the access control system [11] .  ... 
doi:10.1007/3-540-36227-4_58 fatcat:ojtomut4lvas7jzczdod7rm5ju

Access control for healthcare data using extended XACML-SRBAC model

A. A. Abd El-Aziz, A. Kannan
2012 2012 International Conference on Computer Communication and Informatics  
Also we consider one of the models, namely Spatial Role-based access control (SRBAC) and model it using XACML.  ...  This paper proposes a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy to control the privacy and data access of health service data accessed  ...  Many models have been suggested to extend the Role-based access control (RBAC) model to provide location aware access control.  ... 
doi:10.1109/iccci.2012.6158775 fatcat:acgso6chkfcobjuudynnfymb3y

Digital Rights Management Ecosystem and its Usage Controls: A Survey

Zhiyong Zhang
2011 International Journal of Digital Content Technology and its Applications  
In the succeeding section, we investigate usage control approaches in relation to piracy and security risk mitigation for digital content (assets).  ...  Effective usage control technologies can guarantee that end consumers are able to legally access, transfer, and share copyrighted contents and corresponding digital rights.  ...  In addition, there recently exist a context and role-based access control model for digital content [80] , threshold based group-oriented nominative proxy signature scheme (TB-GO-NPSS) for delegating  ... 
doi:10.4156/jdcta.vol5.issue3.26 fatcat:oeqighhzebf3tcc4uvnhxvwaoy

XML-based specification for Web services document security

R. Bhatti, E. Bertino, A. Ghafoor, J.B.D. Joshi
2004 Computer  
Acknowledgments Portions of this work have been supported by the sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University and the National Science  ...  Role-based access control model Our XML-based specification language incorporates these content-and context-based dynamic security requirements for documents in XMLbased Web services.  ...  CONTENT-BASED CONTEXT-AWARE ACCESS Information access may require restrictions based on the content and context related to the access requests.  ... 
doi:10.1109/mc.2004.1297300 fatcat:evbqnayd55ddrd3b44ul5qvdfy

Digital content management: the search for a content management system

Yan Han
2004 Library hi tech  
This article provides detailed analysis of three major players (Greenstone, Fedora, and DSpace) in key areas of digital content management: preservation, metadata, access, and system features based on  ...  Digital Content Management System is a software system that provides preservation, organization and dissemination services for digital collections.  ...  ACKNOWLEDGEMENTS The paper is based on the work of the content management subgroup at the Digital Library and Information Systems Team at the University of Arizona Library.  ... 
doi:10.1108/07378830410570467 fatcat:mk53acoyrvhh5pasxg3h62lzwy

Accessible interactive television using the MPEG-21 standard

Evangelos Vlachogiannis, Damianos Gavalas, George E. Tsekouras, Christos N. Anagnostopoulos
2010 Universal Access in the Information Society  
Based on that standard, iTV accessibility is investigated in terms of metadata and content adaptation.  ...  In this paper, the accessibility of the interactive television (iTV) is being discussed as a primary factor for its satisfactory adoption and commercial success.  ...  Applying such policies requires a mechanism for validating a digital content to a policy description and could be for instance implemented based on Schematron 5 (an XML structure validation language for  ... 
doi:10.1007/s10209-010-0195-7 fatcat:5mf7xyukt5cojirz6rvvhzx6km

Digital Asset Management: A Lowdown on Intricacies of Digital Rights and Permissions

Venkata Naga Satya Surendra Chimakurthi
2020 Global Disclosure of Economics and Business  
Initializing from manual asset management and proceeding towards digital asset management, media asset management, and finalizing at massive content management, these terms seem to be striving to explain  ...  Every organization will opt for its criteria of approach for managing the assets that rely upon the environmental, current cultural, and financial state of the company.  ...  It will be advantageous for a team working since it is easier to to access a single unit than approaching the assets in various depositories.  ... 
doi:10.18034/gdeb.v9i2.605 fatcat:2xeb7aycljehrddv5v2tlhklha
« Previous Showing results 1 — 15 out of 362,192 results